Saturday, February 15, 2020

Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 words

Hacker Culture - Research Paper Example Hackers may also block the public from logging in to the site hence the revenue details would be inaccessible. This study will focus on hacker’s motivation, their personality, and action. Personality of a potential hacker Potential hackers are people suspected to have intent to circumventing through a computer’s security system for their own personal gain. They may include students, employees, activists, and criminals among others. Normally, the potential hackers have an intention to access the information from Wisconsin department of revenue for commercial purposes. From a psychological view, hackers may be bitter about the unemployment rates in the society or they may be people with an exploration mind. Hackers use vulnerability scanners, password cracking software, packet sniffer software and spoofing attach to enter a system. However, due to the development in technology, such hackers can be identified by recently developed software. Such software is able to identif y any unusual activity in the site hence blocking it (Gayle, 1971). Motivation of hackers Wish to make illegal money by stealing Hackers are people with an intention of making an extra income from conning and swindling online businesspersons. By use of their ability to access secured systems, they are able to access important information for example credit cards data, bank details, identity and various other types of information. With such information, they create rogue accounts which they can use to purchase, borrow advance salary, withdraw cash etc. In case hacker accesses information from Wisconsin department of revenue, the government would loss taxes. The hacker would be able to change the income tax values of companies hence making such companies pay small revenue to the government (Jerome, 1986). This would lead to loss of taxes by the government. These unscrupulous individuals always pay these hackers and companies who need to evade paying taxes. Therefore the money they ear n acts as motivation to hacking. Intention to use other people’s ideas The intellectual property rights guide intellectual property. The legal systems of different countries have been designed to provide protection against use of other people’s ideas. However, the hackers are able to access such ideas and present them as their own. The information may include innovations, new formulas, and important research. New ideas and plans of Wisconsin revenue department stay at risk if a hacker has access to their files. Through the intention to use the ideas of other people, hackers are motivated to struggle and circumvent a computer’s security system. Intention to reveal industrial secrets Every business keeps records and files away from the public. Their records remain a deep secret that is only supposed to be accessed by authorized persons only. Such secrets include the marketing policies, the purchasing policies, and company’s plans. In addition, it may includ e illegal business activities used for the benefit of the company. The competitors are guarded from accessing these secrets as way of safeguarding the benefit and future prosperity of the company in the market. Hackers are therefore motivated to work hard and ensure that such vital data is available to the public or to specific competitors (Gu, 2010). Moreover, a

Sunday, February 2, 2020

Structural Transformation through E-business Essay

Structural Transformation through E-business - Essay Example Fred Smith of FEDEX Corp built up his business by identifying a need – the need of Companies for timely delivery of important documents. He invested large amounts of capital in building up an expensive transportation network, because of his belief that a strong market existed among businesses for overnight delivery of time sensitive documents. A centralized computer system existed which kept track of all packages delivered and this was known as COSMOS (Customer Operation, Service Master Online System). A bar code was placed on every package at the pick up point and scanned at every stage of the delivery process. Fred Smith realized early on that the Internet would play a significant part in revolutionizing the logistics of the transportation industry. The centralized database system was improved by introducing various pioneering features, such as handing out PCs with FEDEX software for tracking of packages, hand held signature devices that delivery agents could use to record s ignatures and a website that contained information on package delivery status. Using EDI and the Internet, FEDEX also worked backwards along the supply chain and provided management services at several points along it, where different services could be provided; for example, transportation, inventory control, purchasing, etc. 3. In the achievement of its goals, FEDEX has capitalized the vision of its founder, Smith who believed the success of the Company lay in IT(Lappin, 1996) and has implemented IT systems that are geared towards strengthening its e-commerce operations. The realization that information systems could play a vital role in ensuring the success of business has enabled the Company to survive and gain a head start in package delivery (www.garyclarke.com).